Karl N. Levitt

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
1972
Publication period end
2004
Number of co-authors
24

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Bajcsy, Ruzena, Benzel, Terry, Bishop, Matt, Braden, Robert, Brodley, Carla E., Fahmy, Sonia, Floyd, Sally, Hardaker, W., Joseph, Anthony D., Kesidis, George, Levitt, Karl N., Lindell, Robert, Liu, Peng, Miller, David, Mundy, Russ, Neuman, Cliford, Ostrenga, Ron (2004): Cyber defense technology networking and evaluation. In Communications of the ACM, 47 (3) pp. 58-61. http://doi.acm.org/10.1145/971617.971646

Heckman, Mark, Levitt, Karl N. (1998): Applying the Composition Principle to Verify a Hierarchy of Security Servers. In: HICSS 1998 , 1998, . pp. 338-347. http://csdl.computer.org/comp/proceedings/hicss/1998/8239/03/82390338abs.htm

Zhang, Cui, Becker, Brian R., Peticolas, Dave, Heckman, Mark, Levitt, Karl N., Olsson, Ronald A. (1997): Verification of a Distributed Computing. In: HICSS 1997 , 1997, . pp. 252-261. http://csdl.computer.org/comp/proceedings/hicss/1997/7734/05/7734050252abs.htm

Spitzen, Jay M., Levitt, Karl N., Robinson, Lawrence (1978): An Example of Hierarchical Design and Proof. In Communications of the ACM, 21 (12) pp. 1064-1075.

Robinson, Lawrence, Levitt, Karl N. (1977): Proof Techniques for Hierarchically Structured Programs. In Communications of the ACM, 20 (4) pp. 271-283.

Levitt, Karl N., Kautz, William H. (1972): Cellular Arrays for the Solution of Graph Problems. In Communications of the ACM, 15 (9) pp. 789-801.